Security Glossary of Terms

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X Y Z

- A -

Abuse of Privilege: When a user performs an action that they should not have, according to organizational policy or law. /\

Access: The ability to enter a secured area. The process of interacting with a system. Used as either a verb or a noun. /\

Access Authorization: Permission granted to users, programs or workstations. /\

Access Control: A set of procedures performed by hardware, software and administrators to monitor access, identify users requesting access, record access attempts, and grant or deny access. /\

Access Sharing: Permitting two or more users simultaneous access to file servers or devices. /\

Alphanumeric Key: A sequence of letters, numbers, symbols and blank spaces from one to 80 characters long. /\

ANSI: The American National Standards Institute. Develops standards for transmission storage, languages and protocols. Represents the United States in the ISO (International Standards Organization). /\

Application Level Gateway [Firewall]: A firewall system in which service is provided by processes that maintain complete TCP connection state and sequencing. Application level firewalls often re-address traffic so that outgoing traffic appears to have originated from the firewall, rather than the internal host. /\

Application Logic: The computational aspects of an application, including a list of instructions that tells a software application how to operate. /\

Audit: The independent collection of records to access their veracity and completeness. /\

Audit Trail: An audit trail may be on paper or on disk. In computer security systems, a chronological record of when users log in, how long they arc engaged in various activities, what they were doing, whether any actual or attempted security violations occurred. /\

Authenticate: In networking, to establish the validity of a user or an object (i.e. communications server). /\

Authentication: The process of establishing the legitimacy of a node or user before allowing access to requested information. During the process, the user enters a name or account number (identification) and password (authentication). /\

Authentication Tool: A software or hand-held hardware "key" or "token" utilized during the user authentication process. See key and token. /\

Authentication Token: A portable device used for authenticating a user. Authentication tokens operate by challenge/response, time-based code sequences, or other techniques. This may include paper-based lists of one-time passwords. /\

Authorization: The process of determining what @ of activities are permitted. Usually, authorization is in the context of authentication. Once you have authenticated a user, the user may be authorized different @s of access or activity. /\

Availability: The portion of time that a system can be used for productive work, expressed as a percentage. /\

- B -

Back Door: An entry point to a program or a system that is hidden or disguised, often created by the software's author for maintenance. A certain sequence of control characters permits access to the system manager account. If the back door becomes known, unauthorized users (or malicious software) can gain entry and cause damage. /\

Bandwidth: Capacity of a network or data connection, often measured in kilobits/second (kbps) for digital transmissions. /\

Bastion Host: A system that has been hardened to resist attack at some critical point of entry, and which is installed on a network in such a way that it is expected to come under attack. Bastion hosts are often components of firewalls, or may be 'outside" Web servers or public access systems. Generally, a bastion host is running some form of general purpose operating system (e.g., LNIX, VMS, WNT, etc.) rather than a ROM-based or firmware operating system. /\

Biometric Access Control: Any means of controlling access through human measurements, such as fingerprinting and voiceprinting. /\

Business-Critical Applications: The vital software needed to run a business, whether custom-written or commercially packaged, such as accounting/finance, ERP, manufacturing, human resources, sales databases, etc. /\

- C -

CERT: The Computer Emergency Response Team was established at Carnegie-Mellon University after the 1988 Internet worm attack. /\

Challenge/Response: A security procedure in which one communicator requests authentication of another communicator, and the latter replies with a pre-established appropriate reply. /\

Chroot: A technique under UNIX whereby a process is permanently restricted to an isolated subset of the file system. /\

Client/Device: Hardware that retrieves information from a server.  /\

Clustering: Group of independent systems working together as a single system. Clustering technology allows groups of servers to access a single disk array containing applications and data. /\

Coded File: In encryption, a coded file contains unreadable information. /\

Combined Evaluation: Method using proxy and state or filter evaluations as allowed by administrator. [See State Full Evaluation]. /\

Communications Server: Procedures designed to ensure that telecommunications messages maintain their integrity and are not accessible by unauthorized individuals. /\

Computer Security: Technological and managerial procedures applied to computer systems to ensure the availability, integrity and confidentiality of information managed by the computer system. /\

Computer Security Audit: An independent evaluation of the controls employed to ensure appropriate protection of an organization's information assets. /\

Cryptographic Checksum: A one-way function applied to a file to produce a unique "fingerprint" of the file for later reference. Checksum systems are a primary means of detecting file system tampering on UNIX. /\

- D -

Data Driven Attack: A form of attack in which the attack is encoded in innocuous-seeming data which is executed by a user or other software to implement an attack. In the case of firewalls, a data driven attack is a concern since it may get through the fir-firewall in data form and launch an attack against a system behind the firewall. /\

Data Encryption Standard: An encryption standard developed by EBM and then tested and adopted by the National Bureau of Standards. Published in 1977, the DES standard has proven itself over nearly 20 years of use in both government and private sectors. /\

Decode: Conversion of encoded text to plain text through the use of a code. /\

Decrypt: Conversion of either encoded or enciphered text into plaintext. /\

Dedicated: A special purpose device. Although it is capable of performing other duties, it is assigned to only one. /\

Defense in Depth: The security approach whereby each system on the network is secured to the greatest possible degree. May be used in conjunction with firewalls. /\

DES: Data encryption standard. /\

DNS Spoofing: Assuming the DNS name of another system by either corrupting the name service cache of a victim system, or by compromising a domain name server for a valid domain. /\

Dual Homed Gateway: 1) A system that has two or more network interfaces, each of which is connected to a different network. In firewall configurations, a dual homed gateway usually acts to block or filter some or all of the traffic trying to pass between the networks. 2) A firewall implement without the use of a screening router. /\

- E -

E-mail Bombs: Code that when executed sends many messages to the same address(s) for the purpose of using up disk space and/or overloading the E-mail or web server. /\

Encrypting Router: See Tunneling Router and Virtual Network Perimeter. /\

Encryption: The process of scrambling files or programs, changing one character string to another through an algorithm (such as the DES algorithm). /\

End-to-End Encryption: Encryption at the point of origin in a network, followed by decryption at the destination. /\

Environment: The aggregate of external circumstances, conditions and events that affect the development, operation and maintenance of a system. /\

ERP: An acronym for Enterprise Resource Planning systems that permit organizations to manage resources across the enterprise and completely integrate manufacturing systems. /\

Extranet: "Extranet" refers to extending the LAN via remote or Internet access to partners outside your organization such as frequent suppliers and purchasers.  Such relationships should be over authenticated link to authorized segments of the LAN and are frequently encrypted for privacy." /\

- F -

Fat Client: A computing device, such as a PC or Macintosh, that includes an operating system, RAM, ROM, a powerful processor and a wide range of installed applications that can execute on the desktop or 100% on the server under a Server-based Computing architecture. Fat clients can operate in a Server-based Computing environment. /\

Fault Tolerance: A design method that ensures continued systems operation in the event of individual failures by providing redundant system elements. /\

Firewall: A system or combination of systems that enforces a boundary between two or more networks. /\

Flooding programs: Code which when executed will bombard the selected system with requests in an effort to slow down or shut down the system. /\

Anonymous FTP: A guest account which allows anyone to login to the FTP Server. It can be a point to begin access on the host server. /\

- G -

Gateway: A bridge between two networks. /\

Generic Utilities: General purpose code and devices; i.e., screen grabbers and sniffers that look at data and capture information like passwords, keys and secrets. /\

Global Security: The ability of an access control package to permit protection across a variety of mainframe environments, providing users with a common security interface to all. /\

Granularity: The relative fineness or coarseness by which a mechanism can be adjusted. /\

- H -

Hack: Any software in which a significant portion of the code was originally another program. /\

Hacker: Those intent upon entering an environment to which they are not entitled entry for whatever purpose [entertainment, profit, theft, prank, etc.]. Usually iterative techniques escalating to more advanced methodologies and use of devices to intercept the communications property of another. /\

Host-based Security: The technique of securing an individual system from attack. Host-based security is operating system and version dependent. /\

Hot Standby: A backup system configured in such a way that it may be used if the system goes down. /\

Hybrid Gateways: An unusual configuration with routers that maintain the complete state of the TCP/IP connections or examine the traffic to try to detect and prevent attack [may involve baston host]. If very complicated it is difficult to attach; and, difficult to maintain and audit. /\

- I -

ICA: An acronym for Citrix's Independent Computing Architecture, a three-part Server-based Computing technology that separates an application's logic from its user interface and allows 100% application execution on the server. /\

IETF: The Internet Engineering Task Force, a public forum that develops standards and resolves operational issues for the Internet. IETF is purely voluntary. /\

Information Systems Technology: The protection of information assets from accidental or intentional but unauthorized disclosure, modification, or destruction, or the inability to process that information. /\

Insider Attack: An attack originating from inside a protected network. /\

Internet (The Beginning): The Internet had its roots in early 1969 when the ARPANET was formed. ARPA stands for Advanced Research Projects Agency (which was part of the U.S. Department of Defense). One of the goals of ARPANET was research in distributed computer systems for military purposes. The first configuration involved four computers and was designed to demonstrate the feasibility of building networks using computers dispersed over a wide area. The advent of OPEN networks in the late 1980's required a new model of communications. The amalgamation of many types of systems into mixed environments demanded better translator between these operating systems and a non-proprietary approach to networking in general. Telecommunications Protocol/Internet Protocol {TCP/IP) provided the best solutions to this. /\

Internet (TOM): A web of different, intercommunicating networks funded by both commercial and government organizations. It connects networks in 40 countries. No one owns or runs the Internet. There are thousands of enterprise networks connected to the Internet, and there are millions of users, with thousands more joining every day. /\

Intrusion Detection: Detection of break-ins or break-in attempts either manually via software expert systems that operate on logs or other information available on the network. /\

IP Sniffing: Stealing network addresses by reading the packets. Harmful data is then sent stamped with internal trusted addresses. /\

IP Spoofing: An attack whereby an active, established, session is intercepted and co-opted by the attacker. EP Splicing attacks may occur after an authentication has been made, permitting the attacker to assume the role of an already authorized user. Primary protections against IP Splicing rely on encryption at the session or network layer. /\

IP Spoofing: An attack whereby a system attempts to illicitly impersonate another system by using its EP network address. /\

ISO: International Standards Organization sets standards for data communications. /\

ISSA: Information Systems Security Association. /\

- J -

[No Entries]

- K -

Key: In encryption, a key is a sequence of characters used to encode and decode a file. You can enter a key in two formats: alphanumeric and condensed (hexadecimal). In the network access security market, "key" often refers to the "token," or authentication tool, a device utilized to send and receive challenges and responses during the user authentication process. Keys may be small, hand-held hardware devices similar to pocket calculators or credit cards, or they may be loaded onto a PC as copy-protected, software. /\

- L -

Least Privilege: Designing operational aspects of a system to operate with a minimum amount of system privilege. This reduces the authorization level at which various actions are performed and decreases the chance that a process or user with high privileges may be caused to perform unauthorized activity resulting in a security breach. /\

Local Area Network (LAN): An interconnected system of computers and peripherals, LAN users share data stored on hard disks and can share printers connected to the network. /\

Logging: The process of storing information about events that occurred on the firewall or network. /\

Log Processing: How audit logs are processed, searched for key events, or summarized. /\

Log Retention: How long audit logs are retained and maintained. /\

- M -

Mobile Code: A program downloaded from the internet that runs automatically on a computer with little or no user interaction.

Multi-User: The ability for multiple concurrent users to log on and run applications from a single server.  /\

- N -

Network Computer (NC): A "thin" client hardware device that executes applications locally by downloading them from the network. NCs adhere to a specification jointly developed by Sun, IBM, Oracle, Apple and Netscape. They typically run Java applets within a Java browser, or Java applications within the Java Virtual Machine.  /\

Network Computing Architecture: A computing architecture in which components are dynamically downloaded from the network into the client device for execution by the client. The Java programming language is at the core of network computing.  /\

Network-Level Firewall: A firewall in which traffic is examined at the network protocol packet level. /\

Network Worm: A program or command file that uses a computer network as a means for adversely affecting a system's integrity, reliability or availability, A network worm may attack from one system to another by establishing a network connection. It is usually a self-contained program that does not need to attach itself to a host file to infiltrate network after network. /\

- O -

One-Time Password: In network security, a password issued only once as a result of a challenge-response authentication process. Cannot be "stolen" or reused for unauthorized access. /\

Operating System: System software that controls a computer and its peripherals. Modern operating systems such as Windows 95 and NT handle many of a computer’s basic functions. /\

Orange Book: The Department of Defense Trusted Computer System Evaluation Criteria. It provides information to classify computer systems, defining the degree of trust that may be placed in them. /\

- P -

Password: A secret code assigned to a user. A@ known by the computer system. Knowledge of the password associated with the user ID is considered proof of authorization. (See One-Time Password.) /\

Performance: A major factor in determining the overall productivity of a system, performance is primarily tied to availability, throughput and response time.  /\

Perimeter-based Security: The technique of securing a network by controlling access to all entry and exit points of the network. /\

PIN: In computer security, a personal identification number used during the authentication process. Known only to the user. (See Challenge/Response, Two-Factor Authentication.) /\

Policy: Organizational-level rules governing acceptable use of computing resources, security practices, and operational procedures. /\

Private Key: In encryption, one key (or password) is used to both lock and unlock data. Compare with public key. /\

Protocols: Agreed-upon methods of communications used by computers. /\

Proxy: 1) A method of replacing the code for service applications with an improved version that is more security aware. Preferred method is by "service communities", i.e. Oracle, rather than individual applications. Evolved from socket implementations. 2) A software agent that acts on behalf of a user. Typical proxies accept a connection from a user, make a decision as to whether or not the user or client IP address is permitted to use the proxy, perhaps does additional authentication, and then completes a connection on behalf of the user to a remote destination. /\

Public Key: In encryption a two-key system in which the key used to lock data is made public, so everyone can "lock." A second private key is used to unlock or decrypt. /\

- Q -

[No Entries]

- R -

Remote Access: The hookup of a remote computing device via communications lines such as ordinary phone lines or wide area networks to access network applications and information. /\

Remote Presentation Services Protocol: A protocol is a set of rules and procedures for exchanging data between computers on a network. A remote presentation services protocol transfers user interface, keystrokes, and mouse movements between a server and client.  /\

Risk Analysis: The analysis of an organization's information resources, existing controls and computer system vulnerabilities. It establishes a potential level of damage in dollars and/or other assets. /\

Rogue program: Any program intended to damage programs or data. Encompasses malicious Trojan Horses. /\

RSA: A public key cryptosystem named by its inventors, Rivest, Shamir and Adelman, who hold the patent. /\

- S -

Scalability: The ability to expand a computing solution to support large numbers of users without impacting performance.  /\

Screened Host Gateway: A host on a network behind a screening router. The degree to which a screened host may be accessed depends on the screening rules in the router. /\

Screened Subnet: An isolated subnet created behind a screening router to protect the private network. The degree to which the subnet may be accessed depends on the screening rules in the router. /\

Screening Router: A router configured to permit or deny traffic using filtering techniques; based on a set of permission rules installed by the administrator. A component of many firewalls usually used to block traffic between the network and specific hosts on an IP port level. Not very secure; used when "speed" is the only decision criteria. /\

Server: The control computer on a local area network that controls software access to workstations, printers and other parts of the network.  /\

Server-based Computing: An innovative, server-based approach to delivering business-critical applications to end-user devices, whereby an application’s logic executes on the server and only the user interface is transmitted across a network to the client. Its benefits include single-point management, universal application access, bandwidth-independent performance, and improved security for business applications. /\

Server Farm: A group of servers that are linked together as a ‘single system image’ to provide centralized administration and horizontal scaleability.  /\

Session Shadowing: A feature of Citrix WinFrame and MetaFrame that allows administrators and technical support staff to remotely join or take control of a user’s session for diagnosis, support and training.  /\

Session Stealing: See IP Splicing. /\

Single-Point Control: Helps reduce the total cost of application ownership by enabling applications and data to be deployed, managed and supported at the server. Single-point control enables application installations, updates and additions to be made once, on the server, which are then instantly available to users anywhere.  /\

Smart Card: A credit-card-sized device with embedded microelectronics circuitry for storing information about an individual. This is not a key or token, as used in the remote access authentication process. /\

Social Engineering: An attack based on deceiving users or administrators at the target site. Social engineering attacks are typically carried out by telephoning users or operators and pretending to be an authorized user, to attempt to gain illicit access to systems. /\

State Full Evaluation: Methodology using mixture of proxy or filtering technology intermittently depending upon perceived threat [and/or need for "speed"]. /\

- T -

TCO: Total Cost of Ownership, a model that helps IT professionals understand and manage the budgeted (direct) and unbudgeted (indirect) costs incurred for acquiring, maintaining and using an application or a computing system. TCO normally includes training, upgrades, and administration as well as the purchase price. Lowering TCO through single-point control is a key benefit of Server-based Computing.  /\

Thin Client: A low-cost computing device that works in a server-centric computing model. Thin clients typically do not require state-of-the-art, powerful processors and large amounts of RAM and ROM because they access applications from a central server or network. Thin clients can operate in a Server-based Computing environment. /\

Token: A "token" is an authentication too, a device utilized to send and receive challenges and responses during the user authentication process. Tokens may be small, hand-held hardware devices similar to pocket calculators or credit cards. See key. /\

Trojan Horse: 1) Any program designed to do things that the user of the program did not intend to do or that disguises its harmful intent. 2) Program that installs itself while the user is making an authorized entry; and, then are used to break-in and exploit the system. /\

Tunneling Router: A router or system capable of routing traffic by encrypting it and encapsulating it for transmission across an untrusted network, for eventual de-encapsulation and decryption. /\

Turn Commands: Commands inserted to forward mail to another address for interception. /\

Two-Factor Authentication: Two-factor authentication is based on something a user knows (factor one) plus something the user has (factor two). In order to access a network, the user must have both "factors" - just as he/she must have an ATM card and a Personal Identification Number (PIN) to retrieve money from a bank account, In order to be authenticated during the challenge/response process, users must have this specific (private) information. /\

- U -

User: Any person who interacts directly with a computer system. /\

User ID: A unique character string that identifies users. /\

User Identification: User identification is the process by which a user identifies himself to the system as a valid user. (As opposed to authentication, which is the process of establishing that the user is indeed that user and has a right to use the system.) /\

User Interface: The part of an application that the user works with. User interfaces can be text-driven, such as DOS, or graphical, such as Windows. /\

- V -

Virtual Network Perimeter: A network that appears to be a single protected network behind firewalls, which actually encompasses encrypted virtual links over untrusted networks. /\

Virus: A self-replicating code segment. Viruses may or may not contain attack programs or trapdoors. /\

- W -

Windows-Based Terminal (WBT): A fixed-function thin client device that connects to a Citrix WinFrame or MetaFrame server and Terminal Server to provide application access. The key differentiator of a WBT from other thin devices is that all application execution occurs on the server; there is no downloading or local processing of applications at the client. /\

Windows NT 4.0, Terminal Server Edition: A multi-user operating system for Windows NT 4.0 from Microsoft, formerly called "Hydra." /\

- XYZ -

Y2K: An acronym for the Year 2000 Problem that involves three issues - two-digit data storage, leap year calculations and special meanings for dates. /\